
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-23319 is a critical vulnerability discovered in NVIDIA's Triton Inference Server's Python backend affecting both Windows and Linux platforms. The vulnerability was discovered by Ronen Shustin from Wiz Research and disclosed to NVIDIA on May 15, 2025. The issue affects all versions of NVIDIA Triton Inference Server prior to version 25.07 (Wiz Research, NVIDIA Bulletin).
The vulnerability is characterized as an out-of-bounds write condition that can be triggered by sending a specially crafted request to the server's Python backend. It has been assigned a CVSS v3.1 base score of 8.1 (High) with the vector string AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability is tracked under CWE-805 (Buffer Access with Incorrect Length Value) and involves the server's Inter-Process Communication (IPC) mechanism built on named shared memory (/dev/shm) (Wiz Research, NVD).
A successful exploitation of this vulnerability can lead to multiple severe consequences including remote code execution, denial of service, data tampering, and information disclosure. In AI/ML environments, this could result in the theft of valuable AI models, exposure of sensitive data being processed by the models, manipulation of AI model responses, and potential lateral movement within the organization's network (Wiz Research, Hacker News).
NVIDIA has released version 25.07 of the Triton Inference Server to address this vulnerability. Organizations are strongly advised to upgrade both the NVIDIA Triton Inference Server and the Python backend to this version. Additionally, users deploying Triton Inference Server in production settings should follow the Secure Deployment Considerations Guide and ensure that logging and shared memory APIs are protected for use by authorized users only (NVIDIA Bulletin, Wiz Research).
The security community has shown significant concern about this vulnerability due to its potential impact on AI infrastructure. The discovery was part of a larger security research effort by Wiz, which has previously disclosed other NVIDIA vulnerabilities. NVIDIA's security team was praised for their excellent collaboration and swift response to the reported issues (Wiz Research).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."